Michael Cobb CISSP-ISSAP - SearchSecurity SearchSecurity Is it impossible to successfully remove a rootkit? 21 Oct 2008 SearchSecurity Is Triple DES a more secure encryption scheme than DUKPT? 27 Mar 2008 SearchFinancialSecurity Improve Web application security with threat modeling 17 Jan 2008 SearchFinancialSecurity Static and dynamic code analysis: A key factor for application security success 17 Jan 2008 SearchSecurity Preparing for uniform resource identifier (URI) exploits 11 Oct 2007 SearchSecurity How to avoid dangling pointers: Tiny programming errors leave serious security vulnerabilities 13 Sep 2007 SearchSecurity How does SSL 'sit' between the network layer and application layer? 31 Jul 2007 SearchSecurity How secure is the Windows registry? 26 Jul 2007 SearchSecurity What are the drawbacks to application firewalls? 31 May 2007 SearchSecurity What should be done with a RAID-5 array's failed drives? 31 May 2007 SearchSecurity How secure are document scanners and other 'scan to email' appliances? 30 May 2007 SearchSecurity How can header information track down an email spoofer? 02 May 2007 SearchSecurity Will two different operating systems cause administrative problems? 17 Jan 2007 1 2 3 4